Free Delivery Over $100
3712 books were found.
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on... Read More >>
This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using... Read More >>
The papers have been organized into topical sections on privacy and identity management, anonymous credentials,... Read More >>
Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce,... Read More >>
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the... Read More >>
The development and integration of integrity and internal control mechanisms into information system infrastructures... Read More >>
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security... Read More >>
(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice... Read More >>
This book explores a range of topics in Semantic Systems, from underlying universal principles to representation... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on... Read More >>
This book also includes a sample of research, conducted by Professor Xiao's former and current students.Progress... Read More >>
These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key... Read More >>
This brief focuses on radio resource allocation in a heterogeneous wireless medium. In the proposed solutions, mobile... Read More >>
While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies... Read More >>
Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus... Read More >>
With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that... Read More >>
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure... Read More >>
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency... Read More >>
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly... Read More >>
This text introduces the vast and fascinating area of computational number theory. It treats algorithms for common... Read More >>
This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains... Read More >>